Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks
Abstract Denial of Service and Distributed Denial of Service (DoS/DDoS) attacks have been
one of the biggest threats against communication networks and applications throughout the …
one of the biggest threats against communication networks and applications throughout the …
A Survey on the Applications of Semi-supervised Learning to Cyber-security
Machine Learning's widespread application owes to its ability to develop accurate and
scalable models. In cyber-security, where labeled data is scarce, Semi-Supervised Learning …
scalable models. In cyber-security, where labeled data is scarce, Semi-Supervised Learning …
Development of an optimized botnet detection framework based on filters of features and machine learning classifiers using CICIDS2017 dataset
AF Jabbar, IJ Mohammed - IOP Conference Series: Materials …, 2020 - iopscience.iop.org
Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and
causes great harm to the network. In modern years, Botnets became one of the threads that …
causes great harm to the network. In modern years, Botnets became one of the threads that …
Anomaly detection of aviation data bus based on SAE and IMD
H Li, Y Sang, H Ge, J Yan, S Li - Computers & Security, 2024 - Elsevier
To detect remote terminal (RT) spoofing attacks on MIL-STD-1553B data bus and prevent
the network paralysis of integrated avionics system (IAS) caused by misjudgment, an …
the network paralysis of integrated avionics system (IAS) caused by misjudgment, an …
Metro passenger-flow representation via dynamic mode decomposition and its application
Passenger-flow anomaly detection and prediction are essential tasks for intelligent
operation of the metro system. Accurate passenger-flow representation is the foundation of …
operation of the metro system. Accurate passenger-flow representation is the foundation of …
Combined forest: a new supervised approach for a machine-learning-based botnets detection
C Maudoux, S Boumerdassi, A Barcello… - 2021 IEEE Global …, 2021 - ieeexplore.ieee.org
Nowadays, botnet-based attacks are the most preva-lent cyber-threats type. It is therefore
essential to detect this kind of malware using efficient bots detection techniques. This paper …
essential to detect this kind of malware using efficient bots detection techniques. This paper …
Network Anomalies Detection by Unsupervised Activity Deviations Extraction
C Maudoux, S Boumerdassi - 2022 Global Information …, 2022 - ieeexplore.ieee.org
More and more organizations are under cyberattacks. To prevent this kind of threats, it is
essential to detect them upstream by highlighting abnormal activities within networks. This …
essential to detect them upstream by highlighting abnormal activities within networks. This …
Unsupervised Anomaly Knowledge Flow: a Digital Signatures Extraction Approach
C Maudoux, S Boumerdassi - 2023 10th International …, 2023 - ieeexplore.ieee.org
Various machine learning or clustering techniques are applicable for identifying anomalous
activities or particular events in networks by analysing data flows. In this paper we present …
activities or particular events in networks by analysing data flows. In this paper we present …
An Application of Robust Principal Component Analysis Methods for Anomaly Detection
KB Genel, HE Çelik - Turkish Journal of Science and Technology, 2024 - dergipark.org.tr
Ensuring a secure network environment is crucial, especially with the increasing number of
threats and attacks on digital systems. Implementing effective security measures, such as …
threats and attacks on digital systems. Implementing effective security measures, such as …
An Ensemble Machine Learning Botnet Detection Framework Based on Noise Filtering
TJ Liu, TS Lin, CW Chen - Journal of Internet Technology, 2021 - jit.ndhu.edu.tw
During the past decade, one of the most serious cyber threats has been the growth of botnet.
Since botnet attacks combine the characteristics of many malicious attacks, they have …
Since botnet attacks combine the characteristics of many malicious attacks, they have …